Description

Nume Application is designed to secure phone conversations and correspondence.NUME Application provides:- encryption of phone conversations;- encryption of each call with a unique cryptographic session key, generated according to Diffie-Hellman algorithm;- encryption of E-mail messages, SMS and MMS;- encryption of NUME Chat messages; - communication in the NUME secure multiuser text Conference;- encryption of text Notes;- SMS notification about the change of a SIM card; - blocking the phone with an SMS command if a user loses his phone; - transmission of an SMS command to turn on a siren on the lost phone;- definition of the phone location using an SMS command.

Each subscriber should have NUME Application on his mobile phone or tablet PC to provide secure communication and data transfer.

This version uses the standard 256 bit AES encryption algorithm. NUME Beta-version software is used only to demonstrate the functions and the voice quality.NUME Beta-version does not guarantee information security. You are welcome to visit CTS website at www.nume.chThere you can purchase the full functionality NUME Application, designed by CTS. Its encryption key guarantees the security of your information.

You must install this app before submitting a review.

Google Play reviews now use Google+ so it's easier to see opinions from people you care about. New reviews will be publicly linked to your Google+ profile. Your name on previous reviews now appears as "A Google User".

Google Play reviews now use Google+ so it's easier to see opinions from people you care about. New reviews will be publicly linked to your Google+ profile. Your name on previous reviews now appears as "A Google User".

Somewhat unreliable. High data loss. I have tried this out using a very strong network connection and get a high loss of voice data. Whole words go missing during a conversation. Also, the web site gives no information on how to purchase or costs. Bit of a dead end really and it looked so good to start with.

Somewhat unreliable. High data loss. I have tried this out using a very strong network connection and get a high loss of voice data. Whole words go missing during a conversation. Also, the web site gives no information on how to purchase or costs. Bit of a dead end really and it looked so good to start with.

Similar

The software you install on your mobile phone can tape your phone calls, capture photo and video not only when you talk or use the camera application but in standby mode as well.

Protection: you should be careful installing new software and check whether it have access to your camera and microphone or not. And check the producing company as well if it trustworthy or not. Eagle Security allows you to get the full list of the applications on your device which have access to camera and microphone and also provides possibility to block access to your hardware.

Substitution of base station

Last time this method has become very popular. Tapping complex can be placed next to you not far than in 500 meters and all the cell phones in the action radius connect to the fake station due to power signal. The complex could be not bigger than a attache case.

Your can’t know that the base station was substituted because the new station transmits all the data to the real one and calls work in the normal way. Everybody can buy such compex at affordable price.

Protection: tracking all the stations your cell phone connects to. Eagle Security checks the signature of a station, mostly tapping complexes have substandard signatures. And it also tracks positions of stations. If a station appears in different places or appears in a new place near to a station placed in the same place before it’d be marked as a suspicious and all the other users will be informed if they connect this station.

Connection to a suspicious base station doesn’t mean that somebody is tapping you for sure. But it’s strongly recommend not to use your phone when it’s connected to untrustworthy base station.

Third method

Having contacts in security agencies you can get an official allowance to wire a cell phone. In many countries it’s enough to give a person a witness status in any judicial case. The person will never even know about that because such tapping is formally legal.

It allows the user to control their presence, listen to voicemail messages (via media streaming), system directory search, call journal and conferencing. The telephony part works by instructing the PBX to make a call to the iPhone, then the PBX makes a call to the desired party. Both calls are made using ISDN. The application also includes proprietary chat (IM).

SML allows you to create a message, and then tell the application when exactly you would like it sent.

Features - Does only what it has been created for- Multicasting- Created message can be cancelled - Support 2 SIM cards- If SIM card is changed, the application will not allow a message to be sent from another number

That's all! You are now ready to communicate privately with your contacts.

Security is based on the well-known ZRTP protocol. ZRTP is acryptographic protocol that allows to negotiate the keys forencryption between two endpoints. It ensures both the authentication between the communication partners and the confidentiality of the information exchanged.

ZRTP is able to protect from one of the most dangerous threats of the VOiP communication: the Man In The MiddleMITM, i.e., when someone can hear your VoIP conversations without being discovered.

The protection from MITM is granted by two security features:- in the first communication the communicating parties verbally cross-check a shared value displayed at both endpoints;- according to the key continuity, new sessions between the same partners are encrypted exploiting part of the last used key preserving the first verbal authentication.

ZRTP requires no prior shared secrets and does not rely on aPublic key infrastructure (PKI) or on certification authorities.

Different keys are generated at the beginning of each session through a Diffie-Hellman key exchange protocol.This allows to bypass the complexity of creating and maintaining a trusted third-party.

CryptMyCall recognizes automatically whether the communicating partners are capable of supporting encrypted communication. If your partner does not have CryptMyCall on his/her device, you can still establish a simple VoIP communication. In this case CryptMyCall alerts you, through a message clearly visible on the screen, that the communication is not encrypted.

CryptMyCall is password-protected, and the password can be chosen by you. This way, nobody can use your CryptMyCall application without your authorization.

This App is a part of intelligent security and communication system Protegus. App is configured to work with security control panel SP131. Contact security company or installer for Protegus setup information and control panel configuration.

Using Protegus App you can control your home anytime from anywhere using mobile device:

* It will look after your car, room or telephone.* It reacts on moves, light, sound.* It records motion data.* It wiretaps the place of protection.* It informs you with the help of SMS or a call.

On the main screen after starting choose sensors, which you would like to use.* Audio sensor reacts on increasing of the sound level;* Light sensor reacts on increasing of the lighting level (if such sensor is available on the telephone);* Motion sensor reacts on changing in space position (the motion sensor combines both acceleration and orientation sensors).

Settings.

The sensors sensitivity: * In case of false responses you should decrease sensibility of corresponded sensor.

Feed-back: * Set telephone number, at which all the calls will be located and SMS will be sent in case of alarm response. Also you can control the alarm from this number.* Also you can enter login and password to your mail at gmail.com service for sending the coordinates at E-mail.* Choose the instruction mode in case of alarm response.* Display an alarm - test alarm mode, it feeds out notifications about responds of sensors at the telephone.* "Report about low battery" – informs about low level of a battery charge.* "System notification SMS" - informs about alarm mode by SMS.

Location: * "Turn on definition" – activates GPS monitoring;* "The period of definition" – in seconds between requests of GPS coordinates;* "The period of sending SMS" – in seconds between sending SMS or a letter at e-mail with coordinates.

The work with the programme.

* "The time of leaving the car" – sets the time in seconds, during which you can leave the secure location.* Making settings – install the timers of sending and type of notifications (SMS, call), and contact telephone number or E-mail.* Place telephone with the alarm in a secret place in a car in order it could receive GPS signals, or, in extreme case, it could receive GPRS.* Choose the necessary track sensors (lighting, sound, motion), turn the button "On" and leave the safeguard place.* After the pointed time in settings "time of leaving the car" the period of "quietness" will begin, during that time the alarm will memorize the condition of all the activated sensors.* After the alarm respond you will be informed with the help of SMS or a call at a contact telephone number about the responded sensor (SMS only).* After 2 responds of the picked sensors the record and the sending of coordinates about location of a car will begin, with a period, pointed out in settings.

Coordinates come in a form of: latitude longitude (12.345678 12.345678;) When receiving SMS with the list of the last coordinates you can enter these coordinates at web-site http://maps.google.com and find a car position or a car way. When receiving coordinates by e-mail in order to review them on the map you should go to the page using the link in the letter.

The control of the alarm-system with the help of sending an SMS with the text:* The turning off the security arrangement - "off"* Turning on the security arrangement – "on"* The request of the last coordinates - "loc"* The request of the position of the alarm-system - "status"* The request callback from alarm on feedback phone number – "call"

By clicking 'SOS' it will be sent an sms with the geographical coordinates to contacts chosen by the user as favorites contacts in case of emergency. These contacts must be saved in app's phone book.You can choose up to 3 favorite numbers .

In order to use the functionality of sending sms in emergency situations the user is required to insert at least one valid number in app's phone book.The favorite contacts can be inserted, edited or deleted easily .

By selecting the submenu 'Send Location by SMS ' you can easily send an SMS with the geographic coordinates and a Google Maps link with your location. You can also enter additional text.Also you can enter multiple phone numbers to send the sms.

By selecting the submenu 'Find my street' it will be generated the address where the device is located.This functionality is useful when you want to communicate/know the address where you are located.

With a simple touch of the section 'Maps' the user will see on the map where it is.Also it's easy to navigate anywhere in the world using maps.

By entering an address in the 'Find address' bar, the app will search the address and if it's valid it will be pointed on the map.

Specifications: It's required Android 3.0 or a higher version. This app works great on Android 4.3.

Is your Internet access being censored? Are some things on the Internet simply not accessible to you? Do you need protection from eavesdroppers or access without a login on an unencrypted wireless hotspot network or any other web-login based Internet access? Would you like to appear to be a user from a different country to avoid inconvenient content restrictions? Or would you prefer if your IP was not logged by every website you visit and everything you do logged by the NSA? Then look no further, you've found the solution!

Our Your Freedom service does all this for you, and more. It defeats censorship, it encrypts all your traffic, it hides your origin and identity, and it just makes things work that don't work without it. All you need is this app. There is a free service (called "FreeFreedom") available permanently to everyone who only needs occasional access and low bandwidth. If you need more, you can always upgrade later - once you know that it solves your problem and you need more than FreeFreedom provides.

Visit our webpage https://www.your-freedom.net/ for in-depth information about our service. We appreciate if you send us crash reports when asked by your phone. To contact us about this app, send email to android@your-freedom.net.

If you would like to always receive the latest beta version instead of the production version and have all the latest features and bugs, please opt in at https://play.google.com/apps/testing/de.resolution.yf_android